CFP last date
20 December 2024
Reseach Article

Immune Distinctive Authentication for E-transaction through Remote Systems

by Sudeep.v, Pradeep Freddy. A, Avinash Choudhary. A.r
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 110 - Number 13
Year of Publication: 2015
Authors: Sudeep.v, Pradeep Freddy. A, Avinash Choudhary. A.r
10.5120/19377-1034

Sudeep.v, Pradeep Freddy. A, Avinash Choudhary. A.r . Immune Distinctive Authentication for E-transaction through Remote Systems. International Journal of Computer Applications. 110, 13 ( January 2015), 21-24. DOI=10.5120/19377-1034

@article{ 10.5120/19377-1034,
author = { Sudeep.v, Pradeep Freddy. A, Avinash Choudhary. A.r },
title = { Immune Distinctive Authentication for E-transaction through Remote Systems },
journal = { International Journal of Computer Applications },
issue_date = { January 2015 },
volume = { 110 },
number = { 13 },
month = { January },
year = { 2015 },
issn = { 0975-8887 },
pages = { 21-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume110/number13/19377-1034/ },
doi = { 10.5120/19377-1034 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:46:16.578441+05:30
%A Sudeep.v
%A Pradeep Freddy. A
%A Avinash Choudhary. A.r
%T Immune Distinctive Authentication for E-transaction through Remote Systems
%J International Journal of Computer Applications
%@ 0975-8887
%V 110
%N 13
%P 21-24
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Fast development in Information Communication Technology (ICT) and cellular telephone innovations empower users to perform online transactions from cell telephones/machines from anyplace, at whenever. Thus users need to oversee various online records. Thusly users key-in numerous login data to verify/access them. Consequently it is troublesome for users to oversee various online record accreditations. Presently users plan to have basic qualifications for all the online records or store them in a content document in cellular telephone and physically get to the record at whatever point they require login certifications. This is a genuine security danger for users, who are more helpless against certifications theft because of spying, shoulder surfing when they perform transactions at un-purified environment, for example, open web joint. In this paper we actualize a novel validation plan Immune Distinctive Authentication for E-Transactions Through Remote Systems (IDAERS) - Identity Based Elliptic Curve Encryption method which encourages users without breaking a sweat to work various online record transaction verification without the need to recall qualifications on cellular telephone gadget.

References
  1. Olkowski, Jr and David,. J,. . Information Security Issues in E­ Commerce 1 I, SANS GlAC Security Essentials, 2001.
  2. Raymond, G. Sin and Ramnath, K. Chellappa, , Personalization versus Privacy: An Empirical Examination of the Online Consumer's Dilemma, Information Technology and Management. 2005, p. 181-202.
  3. Ramnath, K. Chellappa . Consumers' Trust in Electronic Commerce Transactions: The Role of Perceived Privacy and Perceived Security," http://asura. u sc. edu/ram/rcf-papers/sec­ priv. pdf, 2001.
  4. Li Liu, Lei, Ming, Xiao,V, Vrbsky, Li, Chung Chih, and ,Yang, Susan. A Virtual Password Scheme to Protect Passwords. In Proceedings of the ICe. 2008, 1536-1540.
  5. CISCO, Implementing Keychain Management on Cisco lOS XR Software Cisco lOS XR System Security Configuration Guide.
  6. Danfeng Yao, Roberto, , Tamassia and Michael, T Goodrich, Notarized Federated Identity Management for Web Services. In: DSSec . 2006, 133.
  7. R. Tamassia, D. Yao, and ,M. T. Goodrich, "Notarized Federated Identity Management for Web Services" http://www . cs. brown. edu/c gc/ stms/papers/notarizedFIM. p df, accessed July 2010.
  8. Dominique, Simon, Mayer , Ion, Guinard, Iulia and. In Search of an Internet of Things Service Architecture:REST or WS-*? A Developers' Perspective. In Proceedings of MobiQuitous. 2011.
  9. B S, Rajan, Adiga, Balamuralidhar, Shivraj V L, P Ravishankara, , M A, Shastry, and. Lightweight IBE Scheme for Wireless Sensor Nodes. In proceedings of IEEE ANTS 20 13(Accepted).
Index Terms

Computer Science
Information Sciences

Keywords

E-Transactions Elliptic Curve Encryption Information Communication Technology Identity Based Remote Systems public key generator(PKG).